{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T04:24:25Z","timestamp":1777004665335,"version":"3.51.4"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF 2038029"],"award-info":[{"award-number":["NSF 2038029"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF 1564097"],"award-info":[{"award-number":["NSF 1564097"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"IBM Faculty Award"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3170242","type":"journal-article","created":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T20:40:31Z","timestamp":1650919231000},"page":"1785-1799","source":"Crossref","is-referenced-by-count":24,"title":["An Adversarial Approach to Protocol Analysis and Selection in Local Differential Privacy"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7676-0167","authenticated-orcid":false,"given":"M. Emre","family":"Gursoy","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Ko&#x00E7; University, Istanbul, Turkey"}]},{"given":"Ling","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computing, Georgia Institute of Technology, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5917-2577","authenticated-orcid":false,"given":"Ka-Ho","family":"Chow","sequence":"additional","affiliation":[{"name":"College of Computing, Georgia Institute of Technology, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8274-645X","authenticated-orcid":false,"given":"Stacey","family":"Truex","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Denison University, Granville, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9177-114X","authenticated-orcid":false,"given":"Wenqi","family":"Wei","sequence":"additional","affiliation":[{"name":"College of Computing, Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3197390"},{"key":"ref2","volume-title":"Emoji frequency detection and deep link frequency","author":"Thakurta","year":"2017"},{"key":"ref3","first-page":"3571","article-title":"Collecting telemetry data privately","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ding"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"ref6","first-page":"729","article-title":"Locally differentially private protocols for frequency estimation","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Wang"},{"key":"ref7","volume-title":"Apple\u2014Learning With Privacy at Scale","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0015"},{"key":"ref10","article-title":"Mutual information optimally local private discrete distribution estimation","volume-title":"arXiv:1607.08025","author":"Wang","year":"2016"},{"key":"ref11","first-page":"967","article-title":"PCKV: Locally differentially private correlated key-value data collection with optimized utility","volume-title":"Proc. USENIX Secur. Symp.","author":"Gu"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00035"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737527"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2927695"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24157"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2307\/2283137"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2949041"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134086"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298309"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/070710111"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23328"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978310"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi9030184"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23241"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"ref26","first-page":"1877","article-title":"Utility-optimized local differential privacy mechanisms for distribution estimation","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Secur.)","author":"Murakami"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00018"},{"key":"ref28","first-page":"2288","article-title":"Practical locally private heavy hitters","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Bassily"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3196959.3196981"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196906"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812146"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243742"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14778\/3339490.3339496"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319891"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1389735"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00063"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2985524"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00079"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3097822"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2952146"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0022"},{"key":"ref43","first-page":"947","article-title":"Data poisoning attacks to local differential privacy protocols","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Cao"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.754"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/10206\/9652463\/9762731-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09762731.pdf?arnumber=9762731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T21:09:12Z","timestamp":1705957752000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9762731\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3170242","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}